/mbedtls-3.5.0/programs/psa/ |
D | psa_constant_names.c | 289 int main(int argc, char *argv[]) in main() argument 292 !strcmp(argv[1], "help") || in main() 293 !strcmp(argv[1], "--help")) { in main() 294 usage(argv[0]); in main() 298 if (!strcmp(argv[1], "error") || !strcmp(argv[1], "status")) { in main() 302 argv + 2); in main() 303 } else if (!strcmp(argv[1], "alg") || !strcmp(argv[1], "algorithm")) { in main() 305 argv + 2); in main() 306 } else if (!strcmp(argv[1], "curve") || !strcmp(argv[1], "ecc_curve")) { in main() 308 argv + 2); in main() [all …]
|
D | key_ladder_demo.c | 619 int main(int argc, char *argv[]) in main() argument 631 strcmp(argv[1], "help") == 0 || in main() 632 strcmp(argv[1], "-help") == 0 || in main() 633 strcmp(argv[1], "--help") == 0) { in main() 639 char *q = strchr(argv[i], '='); in main() 641 printf("Missing argument to option %s\n", argv[i]); in main() 646 if (strcmp(argv[i], "input") == 0) { in main() 648 } else if (strcmp(argv[i], "label") == 0) { in main() 656 } else if (strcmp(argv[i], "master") == 0) { in main() 658 } else if (strcmp(argv[i], "output") == 0) { in main() [all …]
|
/mbedtls-3.5.0/programs/test/ |
D | query_compile_time_config.c | 39 int main(int argc, char *argv[]) in main() argument 43 if (argc < 2 || strcmp(argv[1], "-h") == 0) { in main() 44 mbedtls_printf(USAGE, argv[0]); in main() 48 if (strcmp(argv[1], "-l") == 0) { in main() 53 if (strcmp(argv[1], "-all") == 0) { in main() 55 if (query_config(argv[i]) != 0) { in main() 62 if (strcmp(argv[1], "-any") == 0) { in main() 64 if (query_config(argv[i]) == 0) { in main() 72 if (query_config(argv[i]) != 0) { in main()
|
D | benchmark.c | 519 int main(int argc, char *argv[]) in main() argument 546 if (strcmp(argv[i], "md5") == 0) { in main() 548 } else if (strcmp(argv[i], "ripemd160") == 0) { in main() 550 } else if (strcmp(argv[i], "sha1") == 0) { in main() 552 } else if (strcmp(argv[i], "sha256") == 0) { in main() 554 } else if (strcmp(argv[i], "sha512") == 0) { in main() 556 } else if (strcmp(argv[i], "des3") == 0) { in main() 558 } else if (strcmp(argv[i], "des") == 0) { in main() 560 } else if (strcmp(argv[i], "aes_cbc") == 0) { in main() 562 } else if (strcmp(argv[i], "aes_xts") == 0) { in main() [all …]
|
D | zeroize.c | 47 int main(int argc, char **argv) in main() argument 62 fp = fopen(argv[1], "r"); in main() 64 mbedtls_printf("Could not open file '%s'\n", argv[1]); in main()
|
/mbedtls-3.5.0/programs/aes/ |
D | crypt_and_hash.c | 70 int main(int argc, char *argv[]) in main() argument 130 mode = atoi(argv[1]); in main() 137 if (strcmp(argv[2], argv[3]) == 0) { in main() 142 if ((fin = fopen(argv[2], "rb")) == NULL) { in main() 143 mbedtls_fprintf(stderr, "fopen(%s,rb) failed\n", argv[2]); in main() 147 if ((fout = fopen(argv[3], "wb+")) == NULL) { in main() 148 mbedtls_fprintf(stderr, "fopen(%s,wb+) failed\n", argv[3]); in main() 159 cipher_info = mbedtls_cipher_info_from_string(argv[4]); in main() 161 mbedtls_fprintf(stderr, "Cipher '%s' not found\n", argv[4]); in main() 169 md_info = mbedtls_md_info_from_string(argv[5]); in main() [all …]
|
/mbedtls-3.5.0/programs/pkey/ |
D | rsa_verify_pss.c | 47 int main(int argc, char *argv[]) in main() argument 70 mbedtls_printf("\n . Reading public key from '%s'", argv[1]); in main() 73 if ((ret = mbedtls_pk_parse_public_keyfile(&pk, argv[1])) != 0) { in main() 74 mbedtls_printf(" failed\n ! Could not read key from '%s'\n", argv[1]); in main() 94 mbedtls_snprintf(filename, 512, "%s.sig", argv[2]); in main() 114 argv[2], hash)) != 0) { in main() 115 mbedtls_printf(" failed\n ! Could not open or read %s\n\n", argv[2]); in main()
|
D | pk_encrypt.c | 49 int main(int argc, char *argv[]) in main() argument 87 mbedtls_printf("\n . Reading public key from '%s'", argv[1]); in main() 90 if ((ret = mbedtls_pk_parse_public_keyfile(&pk, argv[1])) != 0) { in main() 96 if (strlen(argv[2]) > 100) { in main() 101 memcpy(input, argv[2], strlen(argv[2])); in main() 109 if ((ret = mbedtls_pk_encrypt(&pk, input, strlen(argv[2]), in main()
|
D | pk_sign.c | 47 int main(int argc, char *argv[]) in main() argument 86 mbedtls_printf("\n . Reading private key from '%s'", argv[1]); in main() 89 if ((ret = mbedtls_pk_parse_keyfile(&pk, argv[1], "", in main() 91 mbedtls_printf(" failed\n ! Could not parse '%s'\n", argv[1]); in main() 104 argv[2], hash)) != 0) { in main() 105 mbedtls_printf(" failed\n ! Could not open or read %s\n\n", argv[2]); in main() 119 mbedtls_snprintf(filename, sizeof(filename), "%s.sig", argv[2]); in main()
|
D | rsa_sign_pss.c | 48 int main(int argc, char *argv[]) in main() argument 86 mbedtls_printf("\n . Reading private key from '%s'", argv[1]); in main() 89 if ((ret = mbedtls_pk_parse_keyfile(&pk, argv[1], "", in main() 91 mbedtls_printf(" failed\n ! Could not read key from '%s'\n", argv[1]); in main() 117 argv[2], hash)) != 0) { in main() 118 mbedtls_printf(" failed\n ! Could not open or read %s\n\n", argv[2]); in main() 132 mbedtls_snprintf(filename, 512, "%s.sig", argv[2]); in main()
|
D | pk_verify.c | 44 int main(int argc, char *argv[]) in main() argument 67 mbedtls_printf("\n . Reading public key from '%s'", argv[1]); in main() 70 if ((ret = mbedtls_pk_parse_public_keyfile(&pk, argv[1])) != 0) { in main() 79 mbedtls_snprintf(filename, sizeof(filename), "%s.sig", argv[2]); in main() 99 argv[2], hash)) != 0) { in main() 100 mbedtls_printf(" failed\n ! Could not open or read %s\n\n", argv[2]); in main()
|
D | rsa_encrypt.c | 47 int main(int argc, char *argv[]) in main() argument 112 if (strlen(argv[1]) > 100) { in main() 117 memcpy(input, argv[1], strlen(argv[1])); in main() 126 &ctr_drbg, strlen(argv[1]), input, buf); in main()
|
D | rsa_sign.c | 43 int main(int argc, char *argv[]) in main() argument 123 argv[1], hash)) != 0) { in main() 124 mbedtls_printf(" failed\n ! Could not open or read %s\n\n", argv[1]); in main() 138 mbedtls_snprintf(filename, sizeof(filename), "%s.sig", argv[1]); in main() 141 mbedtls_printf(" failed\n ! Could not create %s\n\n", argv[1]); in main()
|
D | rsa_verify.c | 43 int main(int argc, char *argv[]) in main() argument 90 mbedtls_snprintf(filename, sizeof(filename), "%s.sig", argv[1]); in main() 119 argv[1], hash)) != 0) { in main() 120 mbedtls_printf(" failed\n ! Could not open or read %s\n\n", argv[1]); in main()
|
D | pk_decrypt.c | 49 int main(int argc, char *argv[]) in main() argument 62 ((void) argv); in main() 91 mbedtls_printf("\n . Reading private key from '%s'", argv[1]); in main() 94 if ((ret = mbedtls_pk_parse_keyfile(&pk, argv[1], "", in main()
|
/mbedtls-3.5.0/programs/ |
D | wince_main.c | 28 char **argv; in _tmain() local 31 argv = (char **) calloc(argc, sizeof(char *)); in _tmain() 36 argv[i] = (char *) calloc(len, sizeof(char)); in _tmain() 37 wcstombs(argv[i], targv[i], len); in _tmain() 40 return main(argc, argv); in _tmain()
|
/mbedtls-3.5.0/programs/random/ |
D | gen_entropy.c | 39 int main(int argc, char *argv[]) in main() argument 48 mbedtls_fprintf(stderr, "usage: %s <output filename>\n", argv[0]); in main() 52 if ((f = fopen(argv[1], "wb+")) == NULL) { in main() 53 mbedtls_printf("failed to open '%s' for writing.\n", argv[1]); in main() 72 argv[1], in main()
|
D | gen_random_ctr_drbg.c | 42 int main(int argc, char *argv[]) in main() argument 54 mbedtls_fprintf(stderr, "usage: %s <output filename>\n", argv[0]); in main() 58 if ((f = fopen(argv[1], "wb+")) == NULL) { in main() 59 mbedtls_printf("failed to open '%s' for writing.\n", argv[1]); in main() 103 argv[1], in main()
|
/mbedtls-3.5.0/programs/x509/ |
D | load_roots.c | 119 int main(int argc, char *argv[]) in main() argument 136 char *p = argv[i]; in main() 148 if (argv[i][j] >= 'A' && argv[i][j] <= 'Z') { in main() 149 argv[i][j] |= 0x20; in main() 164 opt.filenames = (const char **) argv + i; in main()
|
D | cert_app.c | 130 int main(int argc, char *argv[]) in main() argument 181 p = argv[i]; in main() 188 if (argv[i][j] >= 'A' && argv[i][j] <= 'Z') { in main() 189 argv[i][j] |= 0x20; in main()
|
/mbedtls-3.5.0/programs/util/ |
D | strerror.c | 43 int main(int argc, char *argv[]) in main() argument 46 char *end = argv[1]; in main() 53 val = strtol(argv[1], &end, 10); in main() 55 val = strtol(argv[1], &end, 16); in main()
|
/mbedtls-3.5.0/programs/hash/ |
D | generic_sum.c | 163 int main(int argc, char *argv[]) in main() argument 192 md_info = mbedtls_md_info_from_string(argv[1]); in main() 194 mbedtls_fprintf(stderr, "Message Digest '%s' not found\n", argv[1]); in main() 203 if (argc == 4 && strcmp("-c", argv[2]) == 0) { in main() 204 ret |= generic_check(md_info, argv[3]); in main() 209 ret |= generic_print(md_info, argv[i]); in main()
|
/mbedtls-3.5.0/programs/ssl/ |
D | ssl_context_info.c | 192 void parse_arguments(int argc, char *argv[]) in parse_arguments() argument 202 if (strcmp(argv[i], "-d") == 0) { in parse_arguments() 204 } else if (strcmp(argv[i], "-h") == 0) { in parse_arguments() 206 } else if (strcmp(argv[i], "-v") == 0) { in parse_arguments() 208 } else if (strcmp(argv[i], "-f") == 0) { in parse_arguments() 219 if ((b64_file = fopen(argv[i], "r")) == NULL) { in parse_arguments() 220 printf_err("Cannot find file \"%s\"\n", argv[i]); in parse_arguments() 223 } else if (strcmp(argv[i], "--keep-peer-cert=0") == 0) { in parse_arguments() 225 } else if (strcmp(argv[i], "--dtls-protocol=0") == 0) { in parse_arguments() 925 int main(int argc, char *argv[]) in main() argument [all …]
|
/mbedtls-3.5.0/scripts/ |
D | ecp_comb_table.py | 219 All possible curves: """ % sys.argv[0]) 241 if len(sys.argv) <= 1: 244 for curve in sys.argv[1:]:
|
/mbedtls-3.5.0/programs/fuzz/ |
D | onefile.c | 12 int main(int argc, char **argv) in main() argument 22 fp = fopen(argv[1], "rb"); in main()
|